Samsung | SCH-R270U | Physical and file system extraction for Android`s most popular

Physical and file system extraction for Android`s most popular
FEBRUARY 2012
12:00 PM
AT&T
ING
ORT
P
P
SU
4
3
7,7
Physical and file system extraction for
Android's most popular version 2.3.x
ILES
ROF
P
E
IC
DEV
Release Highlights:
Android
• Android's most popular version 2.3.x, and version 1.5, are now
supported for physical, file system extraction, and decoding for
various devices
• Unlock pattern decoding from an Android image file
Forensic Method
New
Total
Logical Extraction
Physical Extraction*
File System Extraction
Password Extraction
48
53
99
1
201
3930
1644
1358
802
7734
*including GPS Extraction
• 38 new Android devices are now supported for physical extraction
BlackBerry®
• The BlackBerry support package can be stored on a USB flash drive
in addition to an SD card
• 10 new BlackBerry devices are supported for physical extraction
and decoding
iOS Devices
• iMessages can now be extracted from iOS devices running iOS 5.x,
as part of the UFED logical extraction
©2012 Cellebrite USA Corp., All rights Reserved
|
tel: 201 848-8552
|
Unique Extraction
Capabilities
n
oo
gs
in
m
Co
and 85 new Android devices are supported for file system extraction
Samsung Galaxy S, SII & Tab
Android physical extraction and
decoding, bypassing PIN/unlock pattern
Motorola
Android physical extraction and
decoding, bypassing PIN/unlock pattern
Nokia BB5
Physical extraction and decoding,
bypassing user lock code
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – FEBRUARY 2012
Physical and File System Extraction for Android's Most Popular Version
2.3.x
Devices running Android's most popular version 2.3.x, and verion 1.5, are now supported for physical extraction and file system extraction. The
extraction can be performed on rooted and non-rooted devices running those versions. Decoding is also supported for numerous devices.
The physical and file system extraction are carried out via the UFED, while the decoding, analysis and reporting are carried out using the UFED Physical
Analyzer.
Platform
Distribution
Android 3.0, 0.10%
Cellebrite Supported
Android 1.5
0.6%
Android 1.6
1.0%
Android 2.1
7.6%
Android 2.2
27.8%
Android 2.3 - Android 2.3.2
0.5%
Android 2.3.3 - Android 2.3.7
58.1%
Android 3.0
0.1%
Logical extraction only
Android 3.1
1.4%
Logical extraction only
Android 3.2
1.9%
Logical extraction only
Android 4.0 -Android 4.0.2
0.3%
Logical extraction only
Android 4.0.3
0.7%
Logical extraction only
Android 3.1, 1.40%
Android 3.2, 1.90%
Android 4.0 - 4.0.2, 0.30%
Android 4.0.3, 0.70%
Android 1.5, 0.60%
Android 1.6, 1.00%
Android 2.3.3 - 2.3.7,
58.10%
Android 2.1, 7.60%
Android 2.2, 27.80%
*Source: http://developer.android.com/resources/dashboard/platform-versions.html
Android 2.3 - 2.3.2, 0.50%
Unlock Pattern Decoding From an Android Image File
UFED Physical Analyzer introduces unlock pattern decoding from an Android image file using a new plug-in, "Android Unlock Pattern Carver". The new
plug-in can be executed on image file created by the UFED device, JTAG, chip-off or other tools and for which decoding is not yet supported. The image
file can either be of all device partitions or of user data partition only.
Once the unlock pattern is decoded, unlocking the device allows you to perform file system extraction via the UFED device and view the decoded
data via the UFED Physical Analyzer.
Step-By-Step to decode the unlock pattern:
• Start the UFED Physical Analyzer
• Open an Android physical extraction using either drag and drop
or the "Open Advanced" option
• Run the "Android Unlock Pattern Carver" plug-in
• The unlock pattern is presented in the device info
©2012 Cellebrite USA Corp., All rights Reserved
Page 2
|
tel: 201 848-8552
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – FEBRUARY 2012
Unlock Pattern and PIN Decoding from Locked Android Devices
Perform file system
Successful
Extraction*
extraction
Device locked
using unlock pattern
or numeric PIN
Unlock pattern or
Start decoding
numeric PIN revealing
Extraction is not supported
Perform
physical extraction
Decoding is
supported
Decoding is not yet
supported
Unlock pattern or
Start decoding
numeric PIN revealing
To perform file system
extraction - unlock the
device and turn on the ADB
Run "Android
Unlock pattern
unlock pattern
revealing
carver"
*ADB (Android Debugging Bridge) is enabled for supported phones.
For more information please reffer to the Android physical extraction FAQ’s.
New on Cellebrite’s Website
• BlackBerry® Physical Extraction – FAQ – The page covers Frequently Asked Questions, related to BlackBerry physical extraction and decoding
• New videos – Cellebrite has released new “how-to” videos presenting BlackBerry licensing activation and BlackBerry physical extraction.
The videos are now available both on the Cellebrite website and on our YouTube channel
©2012 Cellebrite USA Corp., All rights Reserved
Page 3
|
tel: 201 848-8552
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – FEBRUARY 2012
48 New Devices Supported via Logical Extraction
Alcatel
Vodafone 555 Blue
Apple
iPod Touch 3G
Archos
80 G9 (Android), 101 G9 (Android)
Chinese phones
ES65, K-Touch N650
HTC
C110e Radar, A510c Wildfire S (Android), A510e Wildfire S (Android), S510b Rhyme, PI86100 Titan II, T7380 Touch Pro 2
Huawei
M920 Activa 4G (Android), U8350 Boulder (Android)
K-Touch
ES65, N650
LG CDMA
VM-510 Rumor Touch, VM-701 Optimus Slider (Android), L45C Optimus Net (Android)
LG GSM
LG-C360, P690f Optimus Net(Android)
Motorola CDMA
MB867 Milestone X2 (Android), XT894 Droid 4 (Android), MZ617 XYBoard 10.1 (Android)
Motorola iDen
i867 (Android)
Nokia GSM
C2-00, C2-05, 710 Lumia, C6-00.1
Philips
X518 Xenium
Samsung CDMA
SCH-U365, SCH-R390, SCH-R930 (Android)
Samsung GSM
SGH-i717 Galaxy Note (Android), SGH-i847 Rugby Smart (Android), GT-E2220 Ch@t 222, GT-S5690 Galaxy Xcover (Android),
GT-N7000 Galaxy Note, GT-I8350 Omnia W, GT-I9250 Galaxy Nexus (Android), GT-i8150T Galaxy Wonder (Android)
Sony Ericsson
CK13i TXT, Xperia MK16i Pro (Android)
UMX
MXC-560, MXC-570
ZTE CDMA
N910 (Android)
ZTE GSM
Racer II, T11 MaxiPhone
53 New Devices Supported via Physical Extraction
Acer
E320 Liquid Express (Android)*
BlackBerry CDMA
8130 Pearl, 8230 Pearl Flip, 8330 Curve, 8350i Curve, 8830, 9670 Style
BlackBerry GSM
8220 Pearl Flip, 8310 Curve, 9100 Pearl, 9550 Storm 2
Chinese phones
SUNUP TK007, Nokia N99, Fly E146, DAXIAN T7000
HTC
PG59100 myTouch 4G Slide (Android)*, S510e Desire S (Android)*, S710e Incredible S (Android)*, T7373 Evo Shift 4G
(Android)*, PI39200 Sensation XL (Android)*, PG58100 Sensation 4G (Android)*, PG58130 Sensation XE (Android), PG86100
Evo 3D (Android)*
©2012 Cellebrite USA Corp., All rights Reserved
Page 4
|
tel: 201 848-8552
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – FEBRUARY 2012
53 New Devices Supported via Physical Extraction (Cont.)
Huawei
M650 (Android)*, U8110 Pulse Mini (Android)*, U8652 (Android)*
LG CDMA
MS-695 Optimus M+ (Android), AS-855 Optimus (Android)*
LG GSM
P505 (Android)*, P505R (Android)*, C729 DoublePlay (Android)*, P925g Optimus 3D (Android)*
Motorola CDMA
XT610 Droid Pro (Android), MB855 Photon 4G (Android), XT865 Droid Bionic (Android), MB867 Milestone X2 (Android)*, MB870
Droid X2 (Android)
Motorola GSM
A953 Milestone 2 (Android), XT610 Droid Pro (Android)
Motorola iDen
i886 (Android), i412
Pantech
P9070 Burst (Android)
Samsung CDMA
SPH-D705 Epic 2 (Android)*, SPH-D710 Epic 4G Touch (Android)*, SPH-M930 Transform Ultra (Android)*, SCH-R940 Galaxy
S Lightray 4G (Android)*
Samsung GSM
SGH-I777 Galaxy S II (Android)*, GT-I9020a Nexus S (Android)*, GT-I9100 Galaxy S II (Android)
Sony Ericsson
Xperia SK17i Mini Pro (Android)
ZTE CDMA
D930 (Android)
ZTE GSM
P736E Atlas (Android), P736V (Android)*
* Android extraction and decoding
99 New Devices Supported via File System Extraction
Acer
S100 Liquid E (Android), E320 Liquid Express (Android)
Alcatel
Juke (Android), OT-908 One Touch (Android), 909B One Touch (Android), OT-990 One Touch (Android)
BlackBerry GSM
8310 Curve, 8520 Curve, 9100 Pearl
HTC
Nexus One, Wildfire S (Android), PG59100 myTouch 4G Slide (Android), A333 Wildfire (Android), A510c Wildfire S (Android),
A510e Wildfire S (Android), P510e Flyer (Android), S510e Desire S (Android), S710e Incredible S (Android), A7373 Evo Shift
4G (Android), T7373 Evo Shift 4G (Android), PH39100 Vivid (Android), PI39200 Sensation XL (Android), PG58100 Sensation
4G (Android), PG58130 Sensation XE (Android), PG76240 Wildfire (Android), PH85110 Amaze 4G (Android), PG86100 Evo 3D
(Android), PI86100, PG86300 Evo 3D (Android), PG86310 Evo 3D (Android)
Huawei
M650 (Android), M835 Ascend (Android), U8110 Pulse Mini (Android), U8652 (Android)
Kyocera CDMA
C5120 Milano (Android), M9300 Echo (Android)
LG CDMA
VS-660 Vortex (Android), LS-670 Optimus S (Android), VM-670 Optimus (Android), MS-690 Optimus M (Android), MS-695
Optimus M+ (Android), US-740 (Android), VS-761 (Android), AS-855 Optimus (Android), LS-855 Marquee (Android), MS-910
Esteem (Android), LG-7100X
LG GSM
LG-A340, P505 (Android), P505R (Android), LG509TN (Android), C729 DoublePlay (Android), P925g Optimus 3D (Android),
P970 (Android), P500h
©2012 Cellebrite USA Corp., All rights Reserved
Page 5
|
tel: 201 848-8552
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – FEBRUARY 2012
99 New Devices Supported via File System Extraction (Cont.)
Motorola CDMA
V3c (Telus), MB853 Electrify (Android), A854 Milestone (Android), A855 Droid (Android), MB855 Photon 4G (Android), MB867
Milestone X2 (Android), MB870 Droid X2 (Android)
Motorola GSM
A953 Milestone 2 (Android), MB520 Diablo (Android)
Motorola iDen
i1x Titanium (Android), i886 (Android), i940 (Android)
Nokia GSM
Lumia 710.1
Pantech
P9060 Pocket (Android), P9070 Burst (Android)
Samsung CDMA
SCH-R270U, SCH-U365, SPH-D705 Epic 2 (Android), SPH-D710 Epic 4G Touch (Android), SPH-D720 Nexus S 4G (Android),
SCH-R910M (Android), SCH-R920 Attain (Android), SPH-M930 Transform Ultra (Android), SCH-R940 Galaxy S Lightray 4G
(Android)
Samsung GSM
SGH-T759 Exhibit 4G (Android), SGH-I777 Galaxy S II (Android), GT-S5360 Galaxy Y(Android), GT-S5830 Cooper (Android),
GT-N7000 Galaxy Note, GT-i8350 Omnia W, GT-I9020a Nexus S (Android), GT-I9100 Galaxy S II (Android)
Sanyo CDMA
SCP-8600 Zio (Android)
Sharp
EC40 (Android)
Sony Ericsson
Xperia ST15i Mini (Android), Xperia SK17a Mini Pro (Android), Xperia SK17i Mini Pro (Android), Xperia ST17i Active (Android)
Xperia ST18i Ray (Android), Xperia WT19i Live (Android)
ZTE CDMA
X500 Score (Android), D930 (Android)
ZTE GSM
CARL (Android), P736V (Android)
1 New Device Supported via Password Extraction
LG CDMA
LG-7100X
©2012 Cellebrite USA Corp., All rights Reserved
Page 6
|
tel: 201 848-8552
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – FEBRUARY 2012
Cellebrite UFED Software Download and Upgrade Instructions
UFED 1.1.9.3 Firmware Update
Firmware Update Instructions
UFED Physical Analyzer 2.4.3.2
Android Physical Extraction FAQ
UFED Phone Detective 1.1.3
UFED Supported Devices
BlackBerry®
BlackBerry Support Package
UFED BlackBerry physical activation manual
Request for BlackBerry physical
UFED Physical Analyzer BlackBerry decoding
license
activation manual
Don’t forget to register your license at My.Cellebrite.com.
Registration guarantees that you receive vital information and updates
relevant to your UFED System.
©2012 Cellebrite USA Corp., All rights Reserved
Page 7
|
tel: 201 848-8552
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – FEBRUARY 2012
Contact Us
Cellebrite USA Corp.
266 Harristown Rd., Ste. 105
Glen Rock, NJ 07452
Tel. (201) 848 8552
Fax. (201) 848 9982
www.ufedsystem.com
www.facebook.com/CellebriteUFED
Twitter: @CellebriteUSA
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising